• Title/Summary/Keyword: 분만 취약지

Search Result 56, Processing Time 0.023 seconds

Fire Suppression Performance of a New Automatic Fire Extinguisher with Fusible Metal Detectors (이융성금속 응용 자동감지형소화기의 소화성능 특성에 관한 연구)

  • 박용환
    • Fire Science and Engineering
    • /
    • v.17 no.1
    • /
    • pp.1-7
    • /
    • 2003
  • In general, small buildings and residence housings rely on manual fire extinguishers instead of automatic fire suppression systems, which causes bigger disasters during the absence of human-beings or in the presence of children or the olders. For this reason, simple structured and low-cost automatic fire extinguisher using fusible metal detector was newly developed and patented. In this paper, some field tests were carried out to investigate its fire suppression performance. As a result, reaction time of the detection parts varied from 2 min 19s to 7 min 20s depending upon the room size and installation position. It was suggested that to reduce reaction time within 3 minutes, fusible metals with lower melting point should be adopted and the installation location should be moved to near ceiling instead of below 1.5 m.

Analysis and Countermeasure on RSA Algorithm Having High Attack Complexity in Collision-Based Power Analysis Attack (충돌 전력 분석 공격에 높은 공격 복잡도를 갖는 RSA 알고리즘에 대한 취약점 분석 및 대응기법)

  • Kim, Suhri;Kim, Taewon;Jo, Sungmin;Kim, HeeSeok;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.335-344
    • /
    • 2016
  • It is known that power analysis is one of the most powerful attack in side channel analysis. Among power analysis single trace attack is widely studied recently since it uses one power consumption trace to recover secret key of public cryptosystem. Recently Sim et al. proposed new exponentiation algorithm for RSA cryptosystem with higher attack complexity to prevent single trace attack. In this paper we analyze the vulnerability of exponentiation algorithm described by Sim et al. Sim et al. applied message blinding and random exponentiation splitting method on $2^t-ary$ for higher attack complexity. However we can reveal private key using information exposed during pre-computation generation. Also we describe modified algorithm that provides higher attack complexity on collision attack. Proposed algorithm minimized the reuse of value that are used during exponentiation to provide security under single collision attack.

Discussion on Formulation Process and Configuration of Fire-Fighting Vulnerable Zone Model (소방취약지 모델의 구성과 정립프로세스 논의)

  • Kim, Seong Gon;Chang, Eun Mi;Choi, Gap Yong;Kim, Hi Tae
    • Spatial Information Research
    • /
    • v.22 no.3
    • /
    • pp.71-77
    • /
    • 2014
  • There are numbers of unpredictable risk factors in the disaster scenes such as fire, explosion and fail to early life-saving or holding the flames which can lead to massive damage. In particular, fire-fighters who arrive on the scene within 5 minutes after dispatching, have a limitation to get aware to the situation of scene fully, because of immediate deploy to disaster scene with limited information. This situation may lead to disturbance that fire-fighters perform effective fire-fighting activities, to put fire-fighter's life at risk by misjudge the situation. Previous domestic and International studies focused vulnerability for spatial area or features which can damage to life and property in the event of anticipated. In this study, we have been developed fire-fighting vulnerable zone model that can analyze comprehensively hindrance factors for fire-fighting activities targeting whole life cycle of fire-fighting activities from dispatch to fire suppression or life-saving. In addition, we have been given shape to finality and applicability for our model by defining the new concept of fire-fighting vulnerable zone which can be distinguished from the concept of fire vulnerable area in previous studies. The results of this study can be used to analysis fire-fighting vulnerable zone type analysis, establish fire-fighting policies and improve the performance of decision-making process.

Detection and Prevention of Bypassing Attack on VLAN-Based Network Segmentation Environment (VLAN을 이용한 네트워크 분할 환경에서의 네트워크 접근 제어 우회 공격 탐지 및 방어 기법)

  • Kim, Kwang-jun;Hwang, Kyu-ho;Kim, In-kyoung;Oh, Hyung-geun;Lee, Man-hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.449-456
    • /
    • 2018
  • Many organizations divide the network to manage the network in order to prevent the leakage of internal data between separate organizations / departments by sending and receiving unnecessary traffic. The most fundamental network separation method is based on physically separate equipment. However, there is a case where a network is divided and operated logically by utilizing a virtual LAN (VLAN) network access control function that can be constructed at a lower cost. In this study, we first examined the possibility of bypassing the logical network separation through VLAN ID scanning and double encapsulation VLAN hopping attack. Then, we showed and implemented a data leak scenario by utilizing the acquired VLAN ID. Furthermore, we proposed a simple and effective technique to detect and prevent the double encapsulation VLAN hopping attack, which is also implemented for validation. We hope that this study improves security of organizations that use the VLAN-based logical network separation by preventing internal data leakage or external cyber attack exploiting double encapsulation VLAN vulnerability.

A Study of Stable Backup System Considered the Status of Remote System (원격지 시스템 상태를 고려한 안정적인 백업시스템에 관한 연구)

  • Kim, Bum-Jae;Lee, Jun-Ho
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.4 no.2
    • /
    • pp.126-134
    • /
    • 2011
  • In this dissertation, in the light of the above situations, we intend to use new approach for stable and fast backup system. The approach that we propose network and software infrastructure has three different ways by comparison with existing network backup systems. First of all, we use a socket communication so that resolve the shortcoming of weakness of securities; second, TBD utility for minimizing target system loads in the way of instant operating; and third, time division and bandwidth division backup method considered transfer data size(byte) might be useful more stable and fast comparing with FTP Transfer.

Adaptive Partitioning of the Global Key Pool Method using Fuzzy Logic for Resilience in Statistical En-Route Filtering (통계적 여과기법에서 훼손 허용도를 위한 퍼지 로직을 사용한 적응형 전역 키 풀 분할 기법)

  • Kim, Sang-Ryul;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.16 no.4
    • /
    • pp.57-65
    • /
    • 2007
  • In many sensor network applications, sensor nodes are deployed in open environments, and hence are vulnerable to physical attacks, potentially compromising the node's cryptographic keys. False sensing report can be injected through compromised nodes, which can lead to not only false alarms but also the depletion of limited energy resource in battery powered networks. Fan Ye et al. proposed that statistical en-route filtering scheme(SEF) can do verify the false report during the forwarding process. In this scheme, the choice of a partition value represents a trade off between resilience and energy where the partition value is the total number of partitions which global key pool is divided. If every partition are compromised by an adversary, SEF disables the filtering capability. Also, when an adversary has compromised a very small portion of keys in every partition, the remaining uncompromised keys which take a large portion of the total cannot be used to filter false reports. We propose a fuzzy-based adaptive partitioning method in which a global key pool is adaptively divided into multiple partitions by a fuzzy rule-based system. The fuzzy logic determines a partition value by considering the number of compromised partitions, the energy and density of all nodes. The fuzzy based partition value can conserve energy, while it provides sufficient resilience.

  • PDF

A Study on the Methodology of Extracting the vulnerable districts of the Aged Welfare Using Artificial Intelligence and Geospatial Information (인공지능과 국토정보를 활용한 노인복지 취약지구 추출방법에 관한 연구)

  • Park, Jiman;Cho, Duyeong;Lee, Sangseon;Lee, Minseob;Nam, Hansik;Yang, Hyerim
    • Journal of Cadastre & Land InformatiX
    • /
    • v.48 no.1
    • /
    • pp.169-186
    • /
    • 2018
  • The social influence of the elderly population will accelerate in a rapidly aging society. The purpose of this study is to establish a methodology for extracting vulnerable districts of the welfare of the aged through machine learning(ML), artificial neural network(ANN) and geospatial analysis. In order to establish the direction of analysis, this progressed after an interview with volunteers who over 65-year old people, public officer and the manager of the aged welfare facility. The indicators are the geographic distance capacity, elderly welfare enjoyment, officially assessed land price and mobile communication based on old people activities where 500 m vector areal unit within 15 minutes in Yongin-city, Gyeonggi-do. As a result, the prediction accuracy of 83.2% in the support vector machine(SVM) of ML using the RBF kernel algorithm was obtained in simulation. Furthermore, the correlation result(0.63) was derived from ANN using backpropagation algorithm. A geographically weighted regression(GWR) was also performed to analyze spatial autocorrelation within variables. As a result of this analysis, the coefficient of determination was 70.1%, which showed good explanatory power. Moran's I and Getis-Ord Gi coefficients are analyzed to investigate spatially outlier as well as distribution patterns. This study can be used to solve the welfare imbalance of the aged considering the local conditions of the government recently.

Spatial Equality of Firefighting Service in Daejeon Metropolitan City (대전시 소방서비스의 공간적 형평성)

  • An, Yeoung-Ung;Leem, Yountaik;Lee, Sang Ho
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.3
    • /
    • pp.560-571
    • /
    • 2020
  • Essential urban services that protect citizens' lives and property such as firefighting, disaster and crime prevention, should be provided equally to all citizens regardless of their location, personal status, and income. This paper analyzes the equality of firefighting services in spatial and social perspective in Daejeon Metropolitan City. For this the accessibility of fire service was analyzed for all settlements in the city. In addition, the distribution status of low-income class and forecasted income each region were compared to analyze whether the area where fire fighting service in 5 minutes was related to the distribution of income class. According to the analysis, the area where fire service can be provided within 5 minutes was 46.2% of Daejeon, and 98.0% of the population lived in this area. The proportion of old-age pensioners living in the area where fire service can't be provided within 5 minutes was 52.7%, reise than the average of 7.14% in Daejeon. In addition, in areas where the provision of firefighting services exceeds five minutes, the forecasted income tends to be lower in areas where service arrival is delayed. Therefore, it can be said that the economically vulnerable people living in the outskirts of Daejeon are not provided with equal urban services, and policy consideration is required accordingly.

A New Low-Cost Mutual Authentication Protocol in RFID based on Hash Function (해시함수 기반의 새로운 저비용 RFID 상호인증 프로토콜)

  • Bae, Woo-Sik;Lee, Jong-Yun;Kim, Sang-Choon
    • The Journal of Korean Association of Computer Education
    • /
    • v.14 no.1
    • /
    • pp.175-185
    • /
    • 2011
  • Recently RFID systems have been introduced in place of barcode systems to industries such as logistics, distribution, and manufacturing. Due to security vulnerabilities in wireless communication between the reader and tags, however, the authentication protocols for the communication have also been researched extensively. In order to solve the vulnerability of previously proposed protocols, this paper thus proposes an authentication protocol that satisfies the security requirements in the RFID system and minimizes the quantity of computation such as random number generation, transmitting the micro-time of databases. In addition, it is expected that the proposed cross authentication protocol is safe against replay attack, spoofing attack, traffic analysis, and eavesdropping attack when it is applied to the RFID system. Also, it has advantages such as providing a high level of security at a lower manufacturing cost.

  • PDF

Numerical analysis study of reinforced method (loop type) at the double-deck tunnel junction (복층터널 분기부에서의 보강공법(루프형 강선)에 따른 수치해석 연구)

  • Lee, Seok Jin;Park, Skhan;Lee, Jun Ho;Jin, Hyun Sik
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.20 no.5
    • /
    • pp.823-837
    • /
    • 2018
  • Congestion of the city with the rapid industrial development was accelerated to build complex social infrastructure. And numerous structures have been designed and constructed in accordance with these requirements. Recently, to solve complex urban traffic, many researches of large-diameter tunnel under construction downtown are in progress. The large-diameter tunnel has been developed with a versatile double-deck of deep depth tunnel. For the safe tunnel construction, ground reinforcement methods have been developed in the weakened pillar section like as junction of tunnel. This paper focuses on evaluation of the effects of new developed ground reinforcement methods in double-deck junction. The values of reinforcement determined from the existing and developed methods were compared to each other by numerical simulation.